Application-based data encryption system and method thereof
First Claim
Patent Images
1. An application-based data encryption method, implemented in an operating system, comprising:
- encrypting data opened by an application utilizing an encryption key in response to system calls received for storing the data; and
decrypting data requested by the application utilizing a decryption key in response to system calls received for reading the data.
5 Assignments
0 Petitions
Accused Products
Abstract
An application-based data encryption method implemented in an operating system. When receiving system calls for writing data opened by an application, the operating system encrypts the data utilizing an encryption key. When receiving system calls for reading data requested by the application, the operating system decrypts the data utilizing a decryption key. The encryption key and the decryption key may be the same key or two different keys.
-
Citations
18 Claims
-
1. An application-based data encryption method, implemented in an operating system, comprising:
-
encrypting data opened by an application utilizing an encryption key in response to system calls received for storing the data; and
decrypting data requested by the application utilizing a decryption key in response to system calls received for reading the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An application-based data encryption system, comprising:
an operating system comprising a crypto driver, wherein the crypto driver encrypts data opened by an application utilizing an encryption key when the operating system receives system calls for storing the data; and
the crypto driver decrypts data requested by the application utilizing a decryption key when the operating system receives system calls for reading the data.- View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
Specification